• Title/Summary/Keyword: SHA algorithm

Search Result 61, Processing Time 0.023 seconds

High Capacity Information Hiding Method Based on Pixel-value Adjustment with Modulus Operation

  • Li, Teng;Zhang, Yu;Wang, Sha;Sun, Jun-jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1521-1537
    • /
    • 2021
  • Through information hiding technique, secret message can be hidden in pictures. Stego-image quality and hiding capacity are two important metrics for information hiding. To enhance these metrics, many schemes were proposed by scholars in recent years. Some of them are effective and successful, but there is still a room for further improvement. A high capacity information hiding scheme (PAMO, Pixel-value Adjustment with Modulus Operation Algorithm) is introduced in this paper. PAMO scheme uses pixel value adjustment with modulus operation to hide confidential data in cover-image. PAMO scheme and some referenced schemes are implemented in Python and experiments are carried out to evaluate their performance. In the experiments, PAMO scheme shows better performance than other methods do. When secret message length is less than 72000 bits, the highest hiding capacity of PAMO can reach 7 bits per pixel, at the same time the PSNR of stego-images is greater than 30 dB.

Secure Data Sharing in The Cloud Through Enhanced RSA

  • Islam abdalla mohamed;Loay F. Hussein;Anis Ben Aissa;Tarak kallel
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.89-95
    • /
    • 2023
  • Cloud computing today provides huge computational resources, storage capacity, and many kinds of data services. Data sharing in the cloud is the practice of exchanging files between various users via cloud technology. The main difficulty with file sharing in the public cloud is maintaining privacy and integrity through data encryption. To address this issue, this paper proposes an Enhanced RSA encryption schema (ERSA) for data sharing in the public cloud that protects privacy and strengthens data integrity. The data owners store their files in the cloud after encrypting the data using the ERSA which combines the RSA algorithm, XOR operation, and SHA-512. This approach can preserve the confidentiality and integrity of a file in any cloud system while data owners are authorized with their unique identities for data access. Furthermore, analysis and experimental results are presented to verify the efficiency and security of the proposed schema.

Fast Video Motion Estimation Algorithm Based on Motion Speed and Multiple Initial Center Points Prediction (모션 속도와 다중 초기 중심점 예측에 기반한 빠른 비디오 모션 추정 알고리즘)

  • Peng, Sha-Hu;Saipullah, Khairul Muzzammil;Yun, Byung-Choon;Kim, Deok-Hwan
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1219-1223
    • /
    • 2010
  • This paper proposes a fast motion estimation algorithm based on motion speed and multiple initial center points. The proposed method predicts initial search points by means of the spatio-temporal neighboring motion vectors. A dynamic search pattern based on the motion speed and the predicted initial center points is proposed to quickly obtain the motion vector. Due to the usage of the spatio-temporal information and the dynamic search pattern, the proposed method greatly accelerates the search speed while keeping a good predicted image quality. Experimental results show that the proposed method has a good predicted image quality in terms of PSNR with less searching time comparing with the Full Search, New Three-Step Search, and Four-Step Search.

Design and Implementation of Stream Cipher based on SHACAL-2 Superior in the Confidentiality and Integrity (기밀성과 무결성이 우수한 SHACAL-2 기반 스트림 암호 설계 및 구현)

  • Kim, Gil Ho;Cho, Gyeong Yeon
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.12
    • /
    • pp.1427-1438
    • /
    • 2013
  • We have developed a 128-bit stream cipher algorithm composed of the 5-stage pipeline, capable of real-time processing, confidentiality and integrity. The developed stream cipher is a stream cipher algorithm that makes the final 128-bit ciphers through a whitening process after making the ASR 277 bit and SHACAL-2 and applying them to the CFB mode. We have verified the hardware performance of the proposed stream cipher algorithm with Modelsim 6.5d and Quartus II 12.0, and the result shows that the hardware runs at 33.34Mhz(4.27Gbps) at worst case. According to the result, the new cipher algorithm has fully satisfied the speed requirement of wireless Internet and sensor networks, and DRM environment. Therefore, the proposed algorithm with satisfaction of both confidentiality and integrity provides a very useful ideas.

The compression-shear properties of small-size seismic isolation rubber bearings for bridges

  • Wu, Yi-feng;Wang, Hao;Sha, Ben;Zhang, Rui-jun;Li, Ai-qun
    • Structural Monitoring and Maintenance
    • /
    • v.5 no.1
    • /
    • pp.39-50
    • /
    • 2018
  • Taking three types of bridge bearings with diameter being 100 mm as examples, the theoretical analysis, the experimental research as well as the numerical simulation of these bearings is conducted. Since the normal compression and shear machines cannot be applied to the small-size bearings, an improved equipment to test the properties of these bearings is proposed and fabricated. Besides, the simulation of the bearings is conducted based on the explicit finite element software ANSYS/LS-DYNA, and some parameters of the bearings are modified in the finite element model to reduce the computation cost effectively. Results show that all the research methods are capable of revealing the fundamental properties of the small-size bearings, and a combined use of these methods can better catch both the integral properties and the inner detailed mechanical behaviors of the bearings.

Invariant-Feature Based Object Tracking Using Discrete Dynamic Swarm Optimization

  • Kang, Kyuchang;Bae, Changseok;Moon, Jinyoung;Park, Jongyoul;Chung, Yuk Ying;Sha, Feng;Zhao, Ximeng
    • ETRI Journal
    • /
    • v.39 no.2
    • /
    • pp.151-162
    • /
    • 2017
  • With the remarkable growth in rich media in recent years, people are increasingly exposed to visual information from the environment. Visual information continues to play a vital role in rich media because people's real interests lie in dynamic information. This paper proposes a novel discrete dynamic swarm optimization (DDSO) algorithm for video object tracking using invariant features. The proposed approach is designed to track objects more robustly than other traditional algorithms in terms of illumination changes, background noise, and occlusions. DDSO is integrated with a matching procedure to eliminate inappropriate feature points geographically. The proposed novel fitness function can aid in excluding the influence of some noisy mismatched feature points. The test results showed that our approach can overcome changes in illumination, background noise, and occlusions more effectively than other traditional methods, including color-tracking and invariant feature-tracking methods.

Integrated Optimization Design of Carbon Fiber Composite Framework for Small Lightweight Space Camera

  • Yang, Shuai;Sha, Wei;Chen, Changzheng;Zhang, Xingxiang;Ren, Jianyue
    • Journal of the Optical Society of Korea
    • /
    • v.20 no.3
    • /
    • pp.389-395
    • /
    • 2016
  • A Carbon Fiber Composite (CFC) framework was designed for a small lightweight space camera. According to the distribution characteristics of each optical element in the optical system, CFC (M40J) was chosen to accomplish the design of the framework. TC4 embedded parts were used to solve the low accuracy of the CFC framework interface problem. An integrated optimization method and the optimization strategy which combined a genetic global optimization algorithm with a downhill simplex local optimization algorithm were adopted to optimize the structure parameters of the framework. After optimization, the total weight of the CFC framework and the TC4 embedded parts is 15.6 kg, accounting for only 18.4% that of the camera. The first order frequency of the camera reaches 104.8 Hz. Finally, a mechanical environment test was performed, and the result demonstrates that the first order frequency of the camera is 102 Hz, which is consistent with the simulation result. It further verifies the rationality and correctness of the optimization result. The integrated optimization method mentioned in this paper can be applied to the structure design of other space cameras, which can greatly improve the structure design efficiency.

Design of MD5 Hash Processor with Hardware Sharing and Carry Save Addition Scheme (하드웨어 공유와 캐리 보존 덧셈을 이용한 MDS 해쉬 프로세서의 설계)

  • 최병윤;박영수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.139-149
    • /
    • 2003
  • In this paper a hardware design of area-efficient hash processor which implements MD5 algorithm using hardware sharing and carry-save addition schemes is described. To reduce area, the processor adopts hardware sharing scheme in which 1 step operation is divided into 2 substeps and then each substep is executed using the same hardware. Also to increase clock frequency, three serial additions of substep operation are transformed into two carry-save additions and one carry propagation addition. The MD5 hash processor is designed using 0.25 $\mu\textrm{m}$CMOS technology and consists of about 13,000 gates. From timing simulation results, the designed MD5 hash processor has 465 Mbps hash rates for 512-bit input message data under 120 MHz operating frequency.

Noncontrast Computed Tomography-Based Radiomics Analysis in Discriminating Early Hematoma Expansion after Spontaneous Intracerebral Hemorrhage

  • Zuhua Song;Dajing Guo;Zhuoyue Tang;Huan Liu;Xin Li;Sha Luo;Xueying Yao;Wenlong Song;Junjie Song;Zhiming Zhou
    • Korean Journal of Radiology
    • /
    • v.22 no.3
    • /
    • pp.415-424
    • /
    • 2021
  • Objective: To determine whether noncontrast computed tomography (NCCT) models based on multivariable, radiomics features, and machine learning (ML) algorithms could further improve the discrimination of early hematoma expansion (HE) in patients with spontaneous intracerebral hemorrhage (sICH). Materials and Methods: We retrospectively reviewed 261 patients with sICH who underwent initial NCCT within 6 hours of ictus and follow-up CT within 24 hours after initial NCCT, between April 2011 and March 2019. The clinical characteristics, imaging signs and radiomics features extracted from the initial NCCT images were used to construct models to discriminate early HE. A clinical-radiologic model was constructed using a multivariate logistic regression (LR) analysis. Radiomics models, a radiomics-radiologic model, and a combined model were constructed in the training cohort (n = 182) and independently verified in the validation cohort (n = 79). Receiver operating characteristic analysis and the area under the curve (AUC) were used to evaluate the discriminative power. Results: The AUC of the clinical-radiologic model for discriminating early HE was 0.766. The AUCs of the radiomics model for discriminating early HE built using the LR algorithm in the training and validation cohorts were 0.926 and 0.850, respectively. The AUCs of the radiomics-radiologic model in the training and validation cohorts were 0.946 and 0.867, respectively. The AUCs of the combined model in the training and validation cohorts were 0.960 and 0.867, respectively. Conclusion: NCCT models based on multivariable, radiomics features and ML algorithm could improve the discrimination of early HE. The combined model was the best recommended model to identify sICH patients at risk of early HE.

UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk

  • Cheng, Yong;Ma, Jun;Ren, Jiangchun;Mei, Songzhu;Wang, Zhiying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2276-2291
    • /
    • 2017
  • Data protection of removable storage devices is an important issue in information security. Unfortunately, most existing data protection mechanisms are aimed at protecting computer platform which is not suitable for ultra-low-power devices. To protect the flash disk appropriately and efficiently, we propose a trust based USB flash disk, named UTrustDisk. The data protection technologies in UTrustDisk include data authentication protocol, data confidentiality protection and data leakage prevention. Usually, the data integrity protection scheme is the bottleneck in the whole system and we accelerate it by WH universal hash function and speculative caching. The speculative caching will cache the potential hot chunks for reducing the memory bandwidth pollution. We adopt the symmetric encryption algorithm to protect data confidentiality. Before mounting the UTrustDisk, we will run a trusted virtual domain based lightweight virtual machine for preventing information leakage. Besides, we prove formally that UTrustDisk can prevent sensitive data from leaking out. Experimental results show that our scheme's average writing throughput is 44.8% higher than that of NH scheme, and 316% higher than that of SHA-1 scheme. And the success rate of speculative caching mechanism is up to 94.5% since the access pattern is usually sequential.